Search Results - (( binary classification rules algorithm ) OR ( java application during algorithm ))
Search alternatives:
- binary classification »
- classification rules »
- application during »
- java application »
- during algorithm »
- rules algorithm »
-
1
An improved pixel-based and region-based approach for urban growth classification algorithms / Nur Laila Ab Ghani
Published 2015“…The urban growth images obtained are analysed to improve existing classification algorithms. The improved algorithm is constructed by adding new parameter and classification rule to existing algorithm. …”
Get full text
Get full text
Thesis -
2
Genetic algorithm fuzzy logic for medical knowledge-based pattern classification
Published 2018“…This research proposed an algorithm named Genetic Algorithm Fuzzy Logic (GAFL) with Pittsburg approach for rules learning and induction in genetic fuzzy system knowledge discovery. …”
Get full text
Get full text
Article -
3
Text Extraction Algorithm for Web Text Classification
Published 2010“…This study provides a text extraction algorithm for web text classification. The extraction algorithm consists of three phases namely web page extraction, rule formulation, and algorithm validation. …”
Get full text
Get full text
Get full text
Thesis -
4
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
5
Genetic algorithm fuzzy logic for medical knowledge-based pattern classification
Published 2023“…This research proposed an algorithm named Genetic Algorithm Fuzzy Logic (GAFL) with Pittsburg approach for rules learning and induction in genetic fuzzy system knowledge discovery. …”
Article -
6
Overview of biomedical relations extraction using hybrid rule-based approaches.
Published 2013“…However, each of them was implemented in three major types of techniques separately i.e.co-occurrence,kernel based and rule based methods. There are many variants of these algorithms have been developed but the combination of it has not been verified yet. …”
Get full text
Get full text
Get full text
Article -
7
Behavior Recognition In Video Surveillance System For Indoor Public Areas Using Artificial Immune System
Published 2008“…Also, the robust algorithm with hands of artificial immune system rules like binary hamming shape-space and advance detector structure with fast decision making to detect three abnormal behaviors such as entering the forbidden area, standing more than threshold and running was implemented The result obtained showed the improvement in the duration for each phase when compared with previous methods in image segmentation like mixture of Gaussian and behavior recognition like and/Or tree or neural networks.…”
Get full text
Get full text
Thesis -
8
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…The design of our method is a kind of One-Against-All multi classification technique to solve the traditional binary classifier in SVM.…”
Get full text
Get full text
Article -
9
Enhanced Adaptive Neuro-Fuzzy Inference System Classification Method for Intrusion Detection
Published 2024“…Additionally, standard deviation and proposed adaptive K-means algorithms have been employed to minimize the generated rules by ANFIS from the proposed hybrid models. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
11
Analytical framework for predicting online purchasing behavior in Malaysia using a machine learning approach
Published 2025“…The descriptive analysis examines purchasing behavior through correlation and regression analyses, while the predictive model uses decision trees (J48, Random Tree, REPTree), rule-based algorithms (JRip, OneR, PART), and clustering (K-Means) to identify patterns and predict trends. …”
Get full text
Get full text
Thesis -
12
Decision-Level Fusion Scheme For Nasopharyngeal Carcinoma Identification Using Machine Learning Techniques
Published 2020“…We have implemented the fusion of the three image texture-based schemes (local binary patterns, the first-order statistics histogram properties, and histogram of gray scale) at the decision level and tested the performance of this scheme using the same experimental setup in the previous section for simple scorelevel fusion, but for comparison, We used the classifiers methods which are support vector machines (SVM), k-nearest neighbors’ algorithm, and artificial neural network (ANN). …”
Get full text
Get full text
Get full text
Article -
13
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
14
A study on component-based technology for development of complex bioinformatics software
Published 2004“…The first layer is used to detect up to superfamily and family in SCOP hierarchy, by using optimized binary SVM classification rules directly to ROC-Area. …”
Get full text
Get full text
Monograph -
15
-
16
-
17
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
18
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
19
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
